Skip to content
This repository has been archived by the owner on Jan 11, 2023. It is now read-only.

Commit

Permalink
Kubernetes: Azure CNI network monitor agents configuration errata (#3674
Browse files Browse the repository at this point in the history
)
  • Loading branch information
jackfrancis authored Aug 16, 2018
1 parent 62d63a6 commit 74fc515
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 1 deletion.
5 changes: 5 additions & 0 deletions parts/k8s/addons/azure-cni-networkmonitor.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,11 @@ spec:
tolerations:
- key: CriticalAddonsOnly
operator: Exists
# Allow the pod to run on the master.
- key: node-role.kubernetes.io/master
operator: Equal
value: "true"
effect: NoSchedule
nodeSelector:
beta.kubernetes.io/os: linux
containers:
Expand Down
1 change: 0 additions & 1 deletion parts/k8s/kubernetesagentcustomdata.yml
Original file line number Diff line number Diff line change
Expand Up @@ -150,7 +150,6 @@ AGENT_ARTIFACTS_CONFIG_PLACEHOLDER
{{if IsAzureCNI}}
# SNAT outbound traffic from pods to destinations outside of VNET.
iptables -t nat -A POSTROUTING -m iprange ! --dst-range 168.63.129.16 -m addrtype ! --dst-type local ! -d {{WrapAsParameter "vnetCidr"}} -j MASQUERADE
sed -i "s|<azureCNINetworkMonitorImage>|{{WrapAsParameter "AzureCNINetworkMonitorImageURL"}}|g" "/etc/kubernetes/addons/azure-cni-networkmonitor.yaml"
{{end}}
{{if not EnablePodSecurityPolicy}}
sed -i "s|apparmor_parser|d|g" "/etc/systemd/system/kubelet.service"
Expand Down

0 comments on commit 74fc515

Please sign in to comment.